it blocks the actual network traffic. Much harder to detect and troubleshoot.
I guess we need healthchecking in all of our Anti-Virus now, so the end user
can alerted if updates can't be retrieved (but I'm sure most users would really love
to have another pop-up warning window...)

XMLRPC Vulnerabilities (fixed)

James Bercegay wrote in regarding several security holes he discovered
in XMLRPC libraries for PHP:

PHPXMLRPC

Version 1.1 is vulnerable to remote code execution via
a careless eval call. The hole has been fixed and a patch is available.

PEAR XML_RPC Library

Versions 1.3.0 and earlier are vulnerable to remote code
execution. The issue has been fixed and a patch is available.

Fake Microsoft Security Bulletins Alert

A lot of reports have been streaming in regarding fake Microsoft Security Bulletins:http://www.us-cert.gov/current/archive/2005/06/30/archive.html#Fake_MS
Which were recently mentioned here by Kevin Hong (http://isc.sans.org/diary.php?date=2005-06-28)
It is always best to use the standard methods of patch updates (Windows|Microsoft Update)
instead of relying on information or URLs provided in an email.
Especially at the current time where there is some confusion over the new Updater for XP (mentioned in yesterday's diary) and the Rollup patch for Windows 2000 SP4 which has been causing some issues in some environments. Just take a deep breath and double-check everything before executing code (updates, etc) as Administrator.